By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
The most basic hardening procedure involves:
- removing the unnecessary applications and services
- deploying a host firewall
- increasing system logging
- then installing an integrity checking application (such as Tripwire)
Dig Deeper on Linux system security best practices
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.